


default search action
CoRR, August 2011
- Sheng Yi, Hamid Krim, Larry K. Norris:

A Invertible Dimension Reduction of Curves on a Manifold. - Narayan Prasad, Honghai Zhang, Hao Zhu, Sampath Rangarajan:

Multi-User MIMO Scheduling in the Fourth Generation Cellular Uplink. - Jeff M. Phillips, Parasaran Raman, Suresh Venkatasubramanian:

Generating a Diverse Set of High-Quality Clusterings. - Ahmad Abu Al Haija, Mai Vu:

Achievable Rates and Outer Bound for the Half-Duplex MAC with Generalized Feedback. - Alessandra Sala, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng, Ben Y. Zhao:

Revisiting Degree Distribution Models for Social Graph Analysis. - Atilim Günes Baydin, Ramón López de Mántaras, Simeon J. Simoff, Carles Sierra:

CBR with Commonsense Reasoning and Structure Mapping: An Application to Mediation. - Adam B. Yedidia, Michael Chertkov:

Computing the Permanent with Belief Propagation. - Philippe Jacquet, Salman Malik, Bernard Mans, Alonso Silva:

On the Throughput-Delay Trade-off in Georouting Networks. - Jiangyuan Li, Athina P. Petropulu:

Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels with Spherical Uncertainty. - K. Savitha, C. Chandrasekar:

Trusted Network Selection using SAW and TOPSIS Algorithms for Heterogeneous Wireless Networks. - Alexandra Silva, Simon Bliudze, Roberto Bruni, Marco Carbone:

Proceedings Fourth Interaction and Concurrency Experience, ICE 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 59, 2011 [contents] - Michael Schneider, Geoff Sutcliffe:

Reasoning in the OWL 2 Full Ontology Language using First-Order Automated Theorem Proving. - Mardavij Roozbehani, Alexandre Megretski, Eric Feron:

Optimization of Lyapunov Invariants in Verification of Software Systems. - Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:

Differentially Private Search Log Sanitization with Optimal Output Utility. - Yuedong Xu, Eitan Altman, Rachid El Azouzi, Majed Haddad, Salah-Eddine Elayoubi, Tania Jiménez:

Probabilistic Analysis of Buffer Starvation in Markovian Queues. - Sergio Antoy:

On the Correctness of Pull-Tabbing. - Philip Brighten Godfrey:

BGP Stability is Precarious. - Nikolaos Pappas, Jeongho Jeon, Anthony Ephremides, Apostolos Traganitis:

Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node. - Yang D. Li:

BQP and PPAD. - Luca Aceto, Matteo Cimini, Anna Ingólfsdóttir, Arni Hermann Reynisson, Steinar Hugi Sigurdarson, Marjan Sirjani:

Modelling and Simulation of Asynchronous Real-Time Systems using Timed Rebeca. 1-19 - Ross Horne, Vladimiro Sassone:

A Verified Algebra for Linked Data. 20-33 - Simon Ware, Robi Malik:

A State-Based Characterisation of the Conflict Preorder. 34-48 - Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari

:
Predicting global usages of resources endowed with local policies. 49-64 - José Proença

, Dave Clarke, Erik P. de Vink, Farhad Arbab:
Decoupled execution of synchronous coordination models via behavioural automata. 65-79 - Mausumi Bose, Aloke Dey, Rahul Mukerjee:

Key Predistribution Schemes for Distributed Sensor Networks. - Carlos Cotta, Antonio Miguel Mora, Cecilia Merelo-Molina, Juan Julián Merelo Guervós:

FIFA World Cup 2010: A Network Analysis of the Champion Team Play. - Amy Poh Ai Ling, Masao Mukaidono:

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System. - Feng Niu, Ce Zhang, Christopher Ré, Jude W. Shavlik:

Felix: Scaling Inference for Markov Logic with an Operator-based Approach. - Benjamin Doerr, Leslie Ann Goldberg:

Adaptive Drift Analysis. - Rüdiger Ehlers:

Small witnesses, accepting lassos and winning strategies in omega-automata and games. - Rémy Haemmerlé:

Observational equivalences for linear logic CC languages. - Rémy Haemmerlé:

(Co-)Inductive semantics for Constraint Handling Rules. - Stefano Panzieri, Gabriele Oliva, Roberto Setola:

Fuzzy Consensus and Synchronization: Theory and Application to Critical Infrastructure Protection Problems. - Benjamin Doerr, Timo Kötzing, Johannes Lengler, Carola Winzen:

Black-Box Complexities of Combinatorial Problems. - Velimir M. Ilic:

Entropy Semiring Forward-backward Algorithm for HMM Entropy Computation. - Velimir M. Ilic, Miroslav D. Ciric, Miomir S. Stankovic:

Cross-moments computation for stochastic context-free grammars. - William O'Mullane, Xavier Luri, Paul Parsons, Uwe Lammers, John Hoar, Jose Hernandez:

Using Java for distributed computing in the Gaia satellite data processing. - Fabian Steeg

:
Typesafe Modeling in Text Mining. - Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:

Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traffic. - Anh Le, Athina Markopoulou:

On Detecting Pollution Attacks in Inter-Session Network Coding. - Fei Li:

A Comprehensive Study of an Online Packet Scheduling Algorithm. - Erik Agrell:

The Channel Capacity Increases with Power. - Frans A. Oliehoek, Shimon Whiteson, Matthijs T. J. Spaan:

Exploiting Agent and Type Independence in Collaborative Graphical Bayesian Games. - Sergey Kardash:

Algorithmic complexity of pair cleaning method for k-satisfiability problem. (draft version). - Shvetha Soundararajan:

A Methodology for assessing Agile Software Development Approaches. - Feng Wang, Haiyang Wang, Kuai Xu:

Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. - Meng Wang, Weiyu Xu, Enrique Mallada, Ao Tang:

Sparse Recovery with Graph Constraints: Fundamental Limits and Measurement Construction. - Tom Hirschowitz

, Damien Pous
:
Innocent strategies as presheaves and interactive equivalences for CCS. 2-24 - Vincenzo Ciancia

:
Interaction and observation, categorically. 25-36 - Andrei Dorman, Tobias Heindel:

Structured Operational Semantics for Graph Rewriting. 37-51 - Viviana Bono

, Luca Padovani:
Polymorphic Endpoint Types for Copyless Message Passing. 52-67 - Ilias Garnier, Christophe Aussaguès, Vincent David, Guy Vidal-Naquet:

On the reaction time of some synchronous systems. 69-83 - Sung-Shik T. Q. Jongmans, Farhad Arbab:

Correlating Formal Semantic Models of Reo Connectors: Connector Coloring and Constraint Automata. 84-103 - Timothy A. S. Davidson, Simon J. Gay, Rajagopal Nagarajan:

Formal Analysis of Quantum Systems using Process Calculus. 104-110 - Laura Bocchi, Julien Lange

, Emilio Tuosto
:
Amending Contracts for Choreographies. 111-129 - Massimo Bartoletti, Emilio Tuosto

, Roberto Zunino
:
Contracts in distributed systems. 130-147 - Saverio Perugini:

Staging Mixed-Initiative Dialogs by Program Generation and Transformation. - Arian Maleki, Laura Anitori, Zai Yang, Richard G. Baraniuk:

Asymptotic Analysis of Complex LASSO via Complex Approximate Message Passing (CAMP). - Nimalan Nandapalan, Richard P. Brent, Lawrence M. Murray, Alistair P. Rendell:

High-Performance Pseudo-Random Number Generation on Graphics Processing Units. - Ian R. Petersen:

A Kalman Decomposition for Possibly Controllable Uncertain Linear Systems. - Rom Aschner, Matthew J. Katz, Gila Morgenstern:

Symmetric Connectivity with Directional Antennas. - Bogdan Aman

:
Spatial Dynamic Structures and Mobility in Computation. - Jagdish Lal Raheja, Karen Das, Ankit Chaudhary:

An Efficient Real Time Method of Fingertip Detection. - Vahid Aref, Rüdiger L. Urbanke:

Universal Rateless Codes From Coupled LT Codes. - Wing-Kai Hon, Rahul Shah, Sharma V. Thankachan:

Towards an Optimal Space-and-Query-Time Index for Top-$k$ Document Retrieval. - Fritz Müller:

On Berry's conjectures about the stable order in PCF. - Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:

A Group Signature Based Electronic Toll Pricing System. - Tomas Ramirez Picarzo, Francisco Fernández de Vega, Daniel Lombraña Gonzalez:

Proposal for improvement in the transfer and execution of multiple instances of a virtual image. - Laurent Romary, Amir Zeldes, Florian Zipser:

[tiger2/]- Serialising the ISO SynAF Syntactic Object Model. - Yuichiro Fujiwara, Vladimir D. Tonchev:

A characterization of entanglement-assisted quantum low-density parity-check codes. - Carlos A. Astudillo, Adriana M. Gustin, Oscar J. Calderón:

Policy Creation Model for Policy-Based Management in Telecommunications Networks. - Eduardo Cunha de Almeida:

Estudo de Viabilidade de uma Plataforma de Baixo Custo para Data Warehouse. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:

A Novel Trajectory Clustering technique for selecting cluster heads in Wireless Sensor Networks. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:

Enhanced User Authentication through Trajectory Clustering. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:

A Hybrid Trajectory Clustering for Predicting User Navigation. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:

A Fault Tolerant Trajectory Clustering (FTTC) for selecting cluster heads inWireless Sensor Networks. - R. Rathipriya, K. Thangavel, J. Bagyamani:

Binary Particle Swarm Optimization based Biclustering of Web usage Data. - Francis R. Bach, Rodolphe Jenatton, Julien Mairal, Guillaume Obozinski:

Optimization with Sparsity-Inducing Penalties. - Kristina Pickl, Jan Götz, Klaus Iglberger, Jayant Pande, Klaus Mecke, Ana-Suncana Smith, Ulrich Rüde:

All good things come in threes - Three beads learn to swim with lattice Boltzmann and a rigid body solver. - John Augustine, Gopal Pandurangan, Peter Robinson, Eli Upfal:

Towards Robust and Efficient Computation in Dynamic Peer-to-Peer Networks. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:

Scheduling partially ordered jobs faster than 2^n. - Pablo Bisceglia, Leticia I. Gómez, Alejandro A. Vaisman:

Towards Spatio-Temporal SOLAP. - Amirali Abdullah, John Moeller, Suresh Venkatasubramanian:

Approximate Bregman near neighbors in sublinear time: Beyond the triangle inequality. - Irina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov, Roman V. Satyukov:

Searching for Voltage Graph-Based LDPC Tailbiting Codes with Large Girth. - Marcin Peczarski:

Towards Optimal Sorting of 16 Elements. - Xiaohu Shang, H. Vincent Poor:

Noisy-Interference Sum-Rate Capacity for Vector Gaussian Interference Channels. - Matthew P. Johnson, Alexander Gutfraind:

Evader Interdiction and Collateral Damage. - Richard A. Formato:

UWB Array Design Using Variable Zo Technology and Central Force Optimization. - Salman Malik, Alonso Silva, Jean-Marc Kelif:

Optimal Base Station Placement: A Stochastic Method Using Interference Gradient In Downlink Case. - G. S. Payette, K. B. Nakshatrala, J. N. Reddy:

On the performance of high-order finite elements with respect to maximum principles and the non-negative constraint for diffusion-type equations. - Phisan Kaewprapha, Jing Li, Nattakan Puttarak:

Network Localization on Unit Disk Graphs. - Kun-Yu Wang, Anthony Man-Cho So, Tsung-Hui Chang, Wing-Kin Ma, Chong-Yung Chi:

Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization. - Emmanuel Jeandel, Pascal Vanier:

Turing degrees of multidimensional SFTs. - Dror Baron:

Information Complexity and Estimation. - Antanas Zilinskas:

On strong homogeneity of two global optimization algorithms based on statistical models of multimodal objective functions. - T. Asha, S. Natarajan, K. N. Balasubramanya Murthy:

A Data Mining Approach to the Diagnosis of Tuberculosis by Cascading Clustering and Classification. - Magnús M. Halldórsson, Pradipta Mitra:

Wireless Capacity With Arbitrary Gain Matrix. - José Luis López-Presa, Antonio Fernández Anta, Luis Núñez Chiroque:

Conauto-2.0: Fast Isomorphism Testing and Automorphism Group Computation. - Robert Hristovski, Natalia Balagué, Josep Juaneda, Pablo Vázquez:

Onset of coherent attitude layers in a population of sports fans. - Bruno Nery, Rodrigo Ventura:

On the scalability and convergence of simultaneous parameter identification and synchronization of dynamical systems. - Klaus Wehmuth, Artur Ziviani:

Distributed Assessment of Network Centrality. - Yi Wei, Hannes Roth, Carlo A. Furia, Yu Pei, Alexander Horton, Michael Steindorfer, Martin Nordio, Bertrand Meyer:

Stateful Testing: Finding More Errors in Code and Contracts. - Christoph Koutschan

, Viktor Levandovskyy, Oleksandr Motsak:
On Two-generated Non-commutative Algebras Subject to the Affine Relation. - Andrea Tilli, Lorenzo Marconi, Christian Conficoni:

Analysis, Dimensioning and Robust Control of Shunt Active Filter for Harmonic Currents Compensation in Electrical Mains. - Yaniv Taigman, Lior Wolf:

Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition. - Marcin Mucha:

Improved Analysis for Graphic TSP Approximation via Matchings. - Xiaohu Shang, H. Vincent Poor:

Capacity Region of Vector Gaussian Interference Channels with Generally Strong Interference. - Adeniran Isola Oluwaranti, Achimugu Philip:

Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation. - Oluwagbemi Oluwatolani, Abah Joshua, Achimugu Philip:

The Impact of Information Technology in Nigeria's Banking Industry. - Achimugu Philip, Oluwagbemi Oluwatolani, Abah Joshua:

Development of a Window Based Security System for Electronic Data Interchange. - Rudolf Ahlswede, Harout K. Aydinian:

On generic erasure correcting sets and related problems. - Karol Gregor, Yann LeCun:

Learning Representations by Maximizing Compression. - MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kortsarz, Zeev Nutov:

Combinatorial Algorithms for Capacitated Network Design. - Dominic Tsang, Sanjay Chawla:

An index for regular expression queries: Design and implementation. - Amar Prakash Azad, John Musacchio:

Unilateral Altruism in Network Routing Games with Atomic Players. - Yi Zhong, Wenyi Zhang:

Multi-channel Hybrid Access Femtocells: A Stochastic Geometric Analysis. - Juan Julián Merelo Guervós, Carlos Cotta, Antonio Miguel Mora:

1st International Workshop on Complex Systems in Sports - Proceedings. - Yao Sun, Dingkang Wang:

Solving Detachability Problem for the Polynomial Ring by Signature-based Groebner Basis Algorithms. - Ashok Kumar Das:

A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge. - Oldooz Karimi:

Security Model For Service-Oriented Architecture. - Rasmus Pagh:

Compressed Matrix Multiplication. - Vijay Bhaskar Semwal, K. Susheel Kumar, Vinay S. Bhaskar, Meenakshi Sati:

Accurate location estimation of moving object with energy constraint & adaptive update algorithms to save data. - Masaaki Miki:

Three-term Method and Dual Estimate on Static Problems of Continuum Bodies. - Zohra Slimane, Abdelhafid Abdelmalek, Mohammed Feham, Abdelmalik Taleb-Ahmed:

Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model. - Bingxuan Zhao, Shigeru Shimamoto:

Two-stage coordination multi-radio multi-channel mac protocol for wireless mesh networks. - Ruichuan Chen, Eng Keong Lua, Zhuhua Cai, Jon Crowcroft, Zhong Chen:

Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service. - Nenad Stojanovski, Marjan Gusev:

Architecture Of A Identity Based Firewall System. - Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen:

Phagocytes: A Holistic Defense and Protection Against Active P2P Worms. - Raied Salman, Vojislav Kecman, Qi Li, Robert Strack, Erik Test:

Fast k-means algorithm clustering. - N. Sasirekha, A. Edwin Robert, M. Hemalatha:

Program slicing techniques and its applications. - K. Susheel Kumar, Vijay Bhaskar Semwal, Ramesh Chandra Tripathi:

Real time face recognition using adaboost improved fast PCA algorithm. - Eladio Martin, Ruzena Bajcsy:

Variability of location management costs with different mobilities and timer periods to update locations. - Eladio Martin, Ruzena Bajcsy:

Savings in location management costs leveraging user statistics. - Vijay Arya, Darryl Veitch:

Sparsity without the Complexity: Loss Localisation using Tree Measurements. - Anis Ismail, Mohamed Quafafou, Nicolas Durand

, Mohammad Hajjar:
An Efficient Architecture for Information Retrieval in P2P Context Using Hypergraph. - Dusan Jakovetic, José M. F. Moura, João Manuel Freitas Xavier:

Distributed Detection over Noisy Networks: Large Deviations Analysis. - Mohammad Ahmad Alia, Adnan A. Hnaif, Hayam K. Al-Anie, Khulood Abu Maria, Ahmed Manasrah, Muhammad Imran Sarwar:

A Novel Header Matching Algorithm for Intrusion Detection Systems. - Julien Provillard, Enrico Formenti, Alberto Dennunzio:

Non-uniform cellular automata and distributions of rules. - Sheng Yang, Pablo Piantanida, Mari Kobayashi, Shlomo Shamai:

On the Secrecy Degrees of Freedom of Multi-Antenna Wiretap Channels with Delayed CSIT. - Radwan Abujassar, Mohammed Ghanbari:

A Driven Backup Routing Table to Find Alternative Dijoint Path in Ad Hoc Wireless. - Radwan Abujassar, Mohammed Ghanbari:

Efficient Algorithms to Enhance Recovery Schema in Link State Protocols. - A. S. N. Chakravarthy, P. S. Avadhani, P. E. S. N. Krishna Prasad, N. Rajeevand D. Rajasekhar Reddy:

A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network. - Evgenios M. Kornaropoulos, Ioannis G. Tollis:

Weak Dominance Drawings and Linear Extension Diameter. - Taejoon Kim, David James Love, Bruno Clerckx, Duckdong Hwang:

Spatial Degrees of Freedom of the Multicell MIMO Multiple Access Channel. - Rahul Thakurta, Subhajit Dasgupta:

Impact of Software Requirement Volatility Pattern on Project Dynamics: Evidences from a Case Study. - Luca Aceto, Mohammad Reza Mousavi:

Proceedings First International Workshop on Process Algebra and Coordination, PACO 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 60, 2011 [contents] - Feng Zhang, Wenyi Zhang, Qiang Ling:

Non-cooperative Game For Capacity Offload. - Vilas Vasantrao Kardile:

Need to understand "Uncertainty Assessment" in the system development modeling process. - Chitta Ranjan Tripathy, Nibedita Adhikari:

On a New Multicomputer Interconnection Topology for Massively Parallel Systems. - Domenico Prattichizzo, Claudio Pacchierotti, Giulio Rosati:

Tactile feedback as a sensory subtraction technique in haptics for needle insertion. - Lachhman Das Dhomeja, Yasir Arfat Malkani, Azhar Shah, Khalil Khoumbati:

System Support for Managing Invalid Bindings. - René Ndoundam, Juvet Karnel Sadié:

Collision-resistant hash function based on composition of functions. - Nikolaos Triantafyllou, Katerina Ksystra, Petros S. Stefaneas, Panayiotis Frangos:

Applying Algebraic Specifications on Digital Right Management Systems. - Meng Jin, Xiaoliang Li, Dongming Wang:

A New Algorithmic Scheme for Computing Characteristic Sets. - Paola Di Maio

:
'Just Enough' Ontology Engineering. - Paola Di Maio

:
Knowledge Audit Framework. - Sahar Yousefi, Morteza Zahedi:

Gender Recognition Based on Sift Features. - Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti:

Generalized Louvain Method for Community Detection in Large Networks. - Fanggang Wang, Soung Chang Liew, Dongning Guo:

Wireless MIMO Switching with Zero-forcing Relaying and Network-coded Relaying. - Ewan Orr, Ben Martin:

Evolving A-Type Artificial Neural Networks. - Behzad Ahmadi, Osvaldo Simeone:

Robust Coding for Lossy Computing with Receiver-Side Observation Costs. - Giacomo Innocenti:

A frequency approach to topological identification and graphical modeling. - Kui Wu, Yuming Jiang, Dimitri Marinakis:

A Stochastic Calculus for Network Systems with Renewable Energy Sources. - Shaunak Dattaprasad Bopardikar, Subhash Suri:

k-Capture in Multiagent Pursuit Evasion, or the Lion and the Hyenas. - Hassan Tavakoli, Mahmoud Ahmadian-Attari, M. Reza Peyghami:

Optimal Rate for Irregular LDPC Codes in Binary Erasure Channel. - Thomas Sperl:

Imitation of Life: Advanced system for native Artificial Evolution. - Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:

Multilayer Approach to Defend Phishing Attacks. - Lars Kolb, Andreas Thor, Erhard Rahm:

Load Balancing for MapReduce-based Entity Resolution. - Peng Zhang, Yuanyuan Ren, Bo Zhang:

A new embedding quality assessment method for manifold learning. - Cheulsoon Kim, Youngchul Sung, Yong Hoon Lee:

A joint time-invariant filtering approach to the linear Gaussian relay problem. - Rahul Vaze, Harish Ganapathy:

Sub-modularity and Antenna Selection in MIMO systems. - Chen Feng, Danilo Silva, Frank R. Kschischang:

Algebraic Approach to Physical-Layer Network Coding. - Wolfgang Kreitmeier, Tamás Linder:

Entropy Density and Mismatch in High-Rate Scalar Quantization with Renyi Entropy Constraint. - Siavosh Benabbas, Hyun Chul Lee, Joel Oren, Yuli Ye:

Efficient Sum-Based Hierarchical Smoothing Under \ell_1-Norm. - Michal Feldman, Yoav Wilf:

Randomized Strategyproof Mechanisms for Facility Location and the Mini-Sum-of-Squares Objective. - Wenji Wu, Phil DeMar, Donald J. Holmgren

, Amitoj Singh, Ruth Pordes:
G-NetMon: A GPU-accelerated Network Performance Monitoring System for Large Scale Scientific Collaborations. - Scott Aaronson:

Why Philosophers Should Care About Computational Complexity. - (Withdrawn) The Thinking machine: a psychological view of Mawxwell's demon mind.

- Suzana Andova, Luuk Groenewegen, Erik P. de Vink:

Towards reduction of Paradigm coordination models. 1-18 - Natallia Kokash

, Farhad Arbab, Behnaz Changizi, Leonid Makhnist
:
Input-output Conformance Testing for Channel-based Service Connectors. 19-35 - Jos C. M. Baeten, Bert van Beek, Allan van Hulst, Jasen Markovski:

A Process Algebra for Supervisory Coordination. 36-55 - Giorgio Delzanno, Arnaud Sangnier

, Gianluigi Zavattaro:
Parameterized Verification of Safety Properties in Ad Hoc Network Protocols. 56-65 - Marco Bernardo, Rocco De Nicola

, Michele Loreti
:
Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Process Calculi. 66-75 - Amin Sakzad, Mohammad-Reza Sadeghi, Daniel Panario:

Turbo Lattices: Construction and Performance Analysis. - Ahmed Bader, Karim Abed-Meraim, Mohamed-Slim Alouini:

Technical Report: Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks. - Eric Peukert, Julian Eberius, Erhard Rahm:

Rule-based Construction of Matching Processes. - Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn:

Computing a Maximal Independent Set Using Beeps. - Yongquan Fu, Yijie Wang, Ernst W. Biersack:

HybridNN: Supporting Network Location Service on Generalized Delay Metrics. - Mostafa Monemizadeh, Ghosheh Abed Hodtani, Hamed Fehri:

An Achievable Rate Region for Cognitive Radio Channel With Common Message. - Daohang Sha, James S. Thomas:

An Optimization-Based Model for Full-body Reaching Movements. - George Beskales, Marcus Fontoura, Maxim Gurevich, Sergei Vassilvitskii, Vanja Josifovski:

Factorization-based Lossless Compression of Inverted Indices. - Anil Kumar Singh:

A Concise Query Language with Search and Transform Operations for Corpora with Multiple Levels of Annotation. - Michael J. Neely, Arash Saber Tehrani, Zhen Zhang:

Dynamic Index Coding for Wireless Broadcast Networks. - J. Ian Munro, Rajeev Raman, Venkatesh Raman, S. Srinivasa Rao:

Succinct Representations of Permutations and Functions. - D. P. Acharjya, L. Ezhilarasi:

A Knowledge Mining Model for Ranking Institutions using Rough Computing with Ordering Rules and Formal Concept analysis. - Jia Liu, Hanif D. Sherali:

A Distributed Newton Approach for Joint Multi-Hop Routing and Flow Control: Theory and Algorithm. - Ali Kakhbod:

Resource Allocation with Costly Participation. - Jörg Frauendiener, Christian Klein, Vasilisa Shramchenko:

Efficient computation of the branching structure of an algebraic curve. - Julian Becerra-Sagredo, Carlos Málaga

, Francisco Mandujano:
A novel and scalable Multigrid algorithm for many-core architectures. - Fabrizio Angiulli, Fabio Fassetti:

Uncertain Nearest Neighbor Classification. - Boris Aronov, Muriel Dulieu, Ferran Hurtado:

Witness Rectangle Graphs. - Boris Aronov, Muriel Dulieu:

How to Cover a Point Set with a V-Shape of Minimum Width. - Partha Kanuparthy, Constantine Dovrolis, Konstantina Papagiannaki, Srinivasan Seshan, Peter Steenkiste

:
Can User-Level Probing Detect and Diagnose Common Home-WLAN Pathologies? - Raluca A. Popa, Alessandro Chiesa, Tural Badirkhanli, Muriel Médard:

Going Beyond Pollution Attacks: Forcing Byzantine Clients to Code Correctly. - Laura Kovács

, Rosario Pugliese
, Francesco Tiezzi:
Proceedings 7th International Workshop on Automated Specification and Verification of Web Systems, WWV 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 61, 2011 [contents] - Alex Fabrikant, Aaron D. Jaggard, Michael Schapira:

On the Structure of Weakly Acyclic Games. - Rakesh Kumar, Mayank Dave:

A Comparative Study of Various Routing Protocols in VANET. - Rakesh Kumar, Mayank Dave:

Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network. - Yu Zhang, Mihaela van der Schaar:

Reputation-based Incentive Protocols in Crowdsourcing Applications. - Arijit Ukil:

Privacy Preserving Data Aggregation in Wireless Sensor Networks. - Arijit Ukil:

Context Protecting Privacy Preservation in Ubiquitous Computing. - Hans van Ditmarsch:

The Ditmarsch Tale of Wonders. - Serge Kernbach, Tobias Dipper, Donny K. Sutantyo:

Multi-Modal Local Sensing and Communication for Collective Underwater Systems. - Tolga Mataracioglu, Sevgi Ozkan:

User Awareness Measurement Through Social Engineering. - Tolga Mataracioglu, Sevgi Ozkan:

Governing Information Security in Conjunction with COBIT and ISO 27001. - Tolga Mataracioglu, Unal Tatar:

Digital Forensics Analysis of Spectral Estimation Methods. - Tolga Mataracioglu, Unal Tatar:

Spectral Estimation Methods Comparison and Performance Analysis on a Steganalysis Application. - Unal Tatar, Tolga Mataracioglu:

Analysis and Implementation of Distinct Steganographic Methods. - Alexander Golynski, Alessio Orlandi, Rajeev Raman, S. Srinivasa Rao:

Optimal Indexes for Sparse Bit Vectors. - Paolo Castiglione, Stefano Savazzi, Monica Nicoli, Thomas Zemen:

Partner selection in indoor-to-outdoor cooperative networks: an experimental study. - Tobias Koch, Gerhard Kramer:

On Noncoherent Fading Relay Channels at High SNR. - Robert Bredereck:

Graph and Election Problems Parameterized by Feedback Set Numbers. - S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor:

Smart Meter Privacy: A Utility-Privacy Framework. - Lalitha Sankar, Soummya Kar

, Ravi Tandon, H. Vincent Poor:
Competitive Privacy in the Smart Grid: An Information-theoretic Approach. - Federico Schlüter:

A survey on independence-based Markov networks learning. - Enrico S. Canuto, Wilber Acuña-Bravo, Andrés Molano-Jimenez, José Ospina, Carlos Perez-Montenegro:

Embedded Model Control approach to robust control. - Petros Papapanagiotou

, Jacques D. Fleuriot
:
A theorem proving framework for the formal verification of Web Services Composition. 1-16 - Naseem Ibrahim, Vangalur S. Alagar, Mubarak Mohammad:

Specification and Verification of Context-dependent Services. 17-33 - Maurice H. ter Beek

, Stefania Gnesi, Mercy N. Njima:
Product Lines for Service Oriented Applications - PL for SOA. 34-48 - Boni García

, Juan C. Dueñas:
Automated Functional Testing based on the Navigation of Web Applications. 49-65 - María Alpuente

, Demis Ballis, Javier Espert, Francisco Frechina, Daniel Romero:
Debugging of Web Applications with Web-TLR. 66-80 - Letterio Galletta

, Giorgio Levi:
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language. 81-95 - Marco Giunti

:
A type checking algorithm for qualified session types. 96-114 - Artem Polyvyanyy, Luciano García-Bañuelos, Dirk Fahland, Mathias Weske:

Maximal Structuring of Acyclic Process Models. - Shiteng Chen, Tiancheng Lou, Periklis A. Papakonstantinou, Bangsheng Tang:

Width-parameterized SAT: Time-Space Tradeoffs. - Anis Ismail, Abd El Salam Al Hajjar, Ziad Ismail:

A New System Architecture for Pervasive Computing. - Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li:

Binary Error Correcting Network Codes. - Volker Diekert, Steffen Kopecki, Victor Mitrana:

Deciding Regularity of Hairpin Completions of Regular Languages in Polynomial Time. - Renato Paes Leme, Vasilis Syrgkanis, Éva Tardos:

Sequential Auctions and Externalities. - Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani:

Enhanced public key security for the McEliece cryptosystem. - Subhash Khot, Assaf Naor:

Grothendieck-type inequalities in combinatorial optimization. - V. Asha:

Undithering using linear filtering and non-linear diffusion techniques. - Saurabh Anandrao Shivale:

Cryptovirology: Virus Approach. - Duncan A. J. Blythe, Paul von Bünau, Frank C. Meinecke, Klaus-Robert Müller:

Feature Extraction for Change-Point Detection using Stationary Subspace Analysis. - Anna Blasiak, Robert Kleinberg, Eyal Lubetzky:

Lexicographic products and the power of non-linear network coding. - Jason Cloud, Linda Zeger, Muriel Médard:

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study. - Obaid Ur Rehman, Ian R. Petersen, Baris Fidan:

A Minimax Linear Quadratic Gaussian Method for Antiwindup Control Synthesis. - Yao Wu, Qiang Yan, Danny Bickson, Yucheng Low, Qing Yang:

Efficient Multicore Collaborative Filtering. - Mohamed-Haykel Zayani, Vincent Gauthier, Ines Slama, Djamal Zeghlache:

Tensor-Based Link Prediction in Intermittently Connected Wireless Networks. - Abuzer Yakaryilmaz, A. C. Cem Say:

Tight bounds for the space complexity of nonregular language recognition by real-time machines. - Subhojit Som, Philip Schniter:

Compressive Imaging using Approximate Message Passing and a Markov-Tree Prior. - Mathieu Muench:

Classification of Emergency Scenarios. - Jyotirmoy Karjee, H. S. Jamadagni:

Data Accuracy Model for Distributed Clustering Algorithm based on Spatial Data Correlation in Wireless Sensor Networks. - Hichem Sedjelmaci, Mohammed Feham:

Novel hybrid intrusion detection system for clustered wireless sensor network. - Hamid A. Toussi, Ahmed Khademzadeh:

Improving bit-vector representation of points-to sets using class hierarchy. - Yurii Lyubarskii, Preben Gråberg Nes:

Gabor frames with rational density. - Sreenivas Gollapudi, Samuel Ieong, Alexandros Ntoulas, Stelios Paparizos:

Efficient Query Rewrite for Structured Web Queries. - Paul Ginsparg:

It was twenty years ago today ... - Seth James Nielson, Seth J. Fogarty, Dan S. Wallach:

Attacks on Local Searching Tools. - Seth James Nielson, Caleb E. Spare, Dan S. Wallach:

Building Better Incentives for Robustness in BitTorrent. - Seth James Nielson, Dan S. Wallach:

The BitTorrent Anonymity Marketplace. - Eyal En Gad, Anxiao Jiang, Jehoshua Bruck:

Compressed Encoding for Rank Modulation. - Karthik Raman, Thorsten Joachims, Pannaga Shivaswamy:

Structured Learning of Two-Level Dynamic Rankings. - Enoch Yeung, Jorge M. Gonçalves, Henrik Sandberg, Sean Warnick:

The Meaning of Structure in Interconnected Dynamic Systems. - Shinnosuke Seki:

Absoluteness of subword inequality is undecidable. - Mohammad Jalil Piran, Garimella Rama Murthy, G. Praveen Babu:

Vehicular Ad Hoc and Sensor Networks; Principles and Challenges. - Ehsan Ahvar, Alireza Pourmoslemi, Mohammad Jalil Piran:

Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks. - Michel A. Reniers, Pawel Sobocinski:

Proceedings Eight Workshop on Structural Operational Semantics 2011, SOS 2011, Aachen, Germany, 5th September 2011. EPTCS 62, 2011 [contents] - Chong Li, Nicola Elia:

The Information Flow and Capacity of Channels with Noisy Feedback. - Chong Li, Nicola Elia:

Bounds on the Achievable Rate of Noisy feedback Gaussian Channels under Linear Feedback Coding Scheme. - Marina Sapir:

New Risk Modeling Method for Robust Learning on Smaller Samples. - Nitesh V. Chawla, David Hachen, Omar Lizardo, Zoltán Toroczkai, Anthony Strathman, Cheng Wang:

Weighted reciprocity in human communication networks. - Fanny Parzysz, Mai Vu, François Gagnon:

Energy Minimization for the Half-Duplex Relay Channel with Decode-Forward Relaying. - Nicolas T. Courtois, Gregory V. Bard, Daniel Hulme:

A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications. - Hyunseok Chang, Sae-Young Chung:

Capacity of Strong and Very Strong Gaussian Interference Relay-without-delay Channels. - Haohao Qin, Yin Sun, Xiang Chen, Ming Zhao, Jing Wang:

Optimal Power Allocation for OFDM-Based Wire-Tap Channels with Arbitrarily Distributed Inputs. - Lakshmi Prasad Natarajan, K. Pavan Srinath, B. Sundar Rajan:

Generalized Distributive Law for ML Decoding of STBCs. - Olivier Finkel:

Some Problems in Automata Theory Which Depend on the Models of Set Theory. - Norbert Bátfai:

Conscious Machines and Consciousness Oriented Programming. - Yonatan Kaspi, Neri Merhav:

Structure Theorems for Real-Time Variable-Rate Coding With and Without Side Information. - Xuebin Wu, Zhiyuan Yan:

Reduced-Complexity Decoder of Long Reed-Solomon Codes Based on Composite Cyclotomic Fourier Transforms. - Xinping Yi, Edward K. S. Au:

User Scheduling for Heterogeneous Multiuser MIMO Systems: A Subspace Viewpoint. - Tali Kaufman, Alexander Lubotzky:

Edge Transitive Ramanujan Graphs and Highly Symmetric LDPC Good Codes. - Amin Emad, Jun Shen, Olgica Milenkovic:

Symmetric Group Testing and Superimposed Codes. - Peer-Olaf Siebers, Uwe Aickelin:

A First Approach on Modelling Staff Proactiveness in Retail Simulation Models. - Dov M. Gabbay, Karl Schlechta:

Equilibria und weiteres Heiteres II. - (Withdrawn) Fast Approximation Algorithms for Near-optimal Large-scale Network Monitoring.

- Ping Li, Anshumali Shrivastava, Arnd Christian König:

Training Logistic Regression and SVM on 200GB Data Using b-Bit Minwise Hashing and Comparisons with Vowpal Wabbit (VW). - Ehtibar N. Dzhafarov, Janne V. Kujala:

Selectivity in Probabilistic Causality: Drawing Arrows from Inputs to Stochastic Outputs. - Michael Kaufmann, Tamara Mchedlidze, Antonios Symvonis:

Upward Point Set Embeddability for Convex Point Sets is in $P$. - Yanpei Liu, Jing Yang, Stark C. Draper:

Cooperative Packet Routing using Mutual Information Accumulation. - Luca Aceto, Georgiana Caltais, Eugen-Ioan Goriac, Anna Ingólfsdóttir:

Axiomatizing GSOS with Predicates. 1-15 - Ken Madlener, Sjaak Smetsers, Marko C. J. D. van Eekelen:

Formal Component-Based Semantics. 17-29 - Asiri Rathnayake, Hayo Thielecke:

Regular Expression Matching and Operational Semantics. 31-45 - David Romero-Hernández, David de Frutos-Escrig

:
On the Unification of Process Semantics: Logical Semantics. 47-61 - David Gontier, Martin Vetterli:

Sampling based on timing: Time encoding machines on shift-invariant subspaces. - Stéphane Ross, J. Andrew Bagnell:

Stability Conditions for Online Learnability. - Jiyou Li:

On the average sensitivity of laced Boolean functions. - Juan Pablo Carbajal, Rafael Suzuki Bayma, Marc Ziegler, Zi-Qiang Lang:

Modeling and frequency domain analysis of nonlinear compliant joints for a passive dynamic swimmer. - Christos G. Cassandras, Xu Chu Ding, Xuchao Lin:

An Optimal Control Approach for the Persistent Monitoring Problem. - Guodong Shi, Karl Henrik Johansson:

Randomized Optimal Consensus of Multi-agent Systems. - Guodong Shi, Karl Henrik Johansson:

Multi-agent Robust Consensus: Convergence Analysis and Application. - Grazziela P. Figueredo, Uwe Aickelin:

Comparing System Dynamics and Agent-Based Simulation for Tumour Growth and its Interactions with Effector Cells. - Muhammad Shoaib Saleem, Eric Renault, Djamal Zeghlache:

Information Centric Networking based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks. - Marius Kloetzer, Xu Chu Ding, Calin Belta:

Multi-robot Deployment From LTL Specifications with Reduced Communication. - Firouz Abdullah Al-Wassai, N. V. Kalyankar, Ali A. Al-Zaky:

The Statistical methods of Pixel-Based Image Fusion Techniques. - Artem Migukin, Vladimir Katkovnik, Jaakko Astola:

Advanced phase retrieval: maximum likelihood technique with sparse regularization of phase and amplitude. - Thomas Eiter, Esra Erdem, Halit Erdogan, Michael Fink:

Finding Similar/Diverse Solutions in Answer Set Programming. - Matthew A. Hammer, Georg Neis, Yan Chen, Umut A. Acar:

Self-Adjusting Stack Machines. - Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed:

On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster. - Marc Denecker, Victor W. Marek, Miroslaw Truszczynski:

Reiter's Default Logic Is a Logic of Autoepistemic Reasoning And a Good One, Too. - Miroslaw Truszczynski:

Revisiting Epistemic Specifications. - Victor W. Marek, Ilkka Niemelä, Miroslaw Truszczynski:

Origins of Answer-Set Programming - Some Background And Two Personal Accounts. - Puripong Suthisopapan, Kenta Kasai, Anupap Meesomboon, Virasit Imtawil, Kohichi Sakaniwa:

Simple Low-Rate Non-Binary LDPC Coding for Relay Channels. - (Withdrawn) A Lookahead algorithm to compute Betweenness Centrality.

- Byron Knoll, Nando de Freitas:

A Machine Learning Perspective on Predictive Coding with PAQ. - Myoungkuk Park

, Kalyanam Krishnamoorthy, Swaroop Darbha, Phillip R. Chandler, Meir Pachter:
Bounding Procedures for Stochastic Dynamic Programs with Application to the Perimeter Patrol Problem. - Santosh S. Vempala, Ying Xiao:

Structure from Local Optima: Learning Subspace Juntas via Higher Order PCA. - Xiaohong Yuan, Eduardo B. Fernández:

Patterns for Business-to-consumer E-Commerce Applications. - Wei Lu, Namrata Vaswani:

Exact Reconstruction Conditions for Regularized Modified Basis Pursuit. - Mohammad Osmani-Bojd, Assadallah Sahebalam, Ghosheh Abed Hodtani:

A General Achievable Rate Region for Multiple-Access Relay Channels and Some Certain Capacity Theorems. - Jin-yi Cai, Michael Kowalczyk, Tyson Williams:

Gadgets and Anti-gadgets Leading to a Complexity Dichotomy. - Ali Karimoddini, Hai Lin, Ben M. Chen, Tong Heng Lee:

Hybrid 3-D Formation Control for Unmanned Helicopters. - Petr Ambroz, Stepan Holub, Zuzana Masáková:

Proceedings 8th International Conference Words 2011, Prague, Czech Republic, 12-16th September 2011. EPTCS 63, 2011 [contents] - Zengfeng Huang, Ke Yi, Qin Zhang:

Randomized Algorithms for Tracking Distributed Count, Frequencies, and Ranks. - Jin-Ho Chung, Kyeongcheol Yang:

Frequency-Hopping Sequence Sets With Low Average and Maximum Hamming Correlation. - Myung-Kyu Lee, Kyeongcheol Yang:

The Exponent of a Polarizing Matrix Constructed from the Kronecker Product. - Gabriel Ciobanu:

Biologically Inspired Process Calculi, Petri Nets and Membrane Computing. - Luca Cardelli, Cosimo Laneve:

Reversibility in Massive Concurrent Systems. - Jetty Kleijn, Maciej Koutny, Grzegorz Rozenberg:

Petri Nets and Bio-Modelling - and how to benefit from their synergy. - Roberto Barbuti, Diletta Romana Cacciagrano, Andrea Maggiolo-Schettini, Paolo Milazzo, Luca Tesei:

A Testing Framework for P Systems. - Livio Bioglio, Cristina Calcagno, Mario Coppo, Ferruccio Damiani, Eva Sciacca

, Salvatore Spinella, Angelo Troina:
A Spatial Calculus of Wrapped Compartments. - Chiara Bodei, Linda Brodo:

Brane Calculi Systems: A Static Preview of their Possible Behaviour. - Florentin Ipate, Radu Nicolescu, Ionut-Mihai Niculescu, Cristian Stefan:

Synchronization of P Systems with Simplex Channels. - Raghavan Rama, H. Ramesh, Marian Gheorghe, Shankara Narayanan Krishna:

Further Results on Languages of Membrane Structures. - Antoine Spicher, Sergey Verlan:

Generalized Communicating P Systems Working in Fair Sequential Model. - L. Jason Steggles:

Abstracting Asynchronous Multi-Valued Networks: An Initial Investigation. - Federico Buti, Massimo Callisto De Donato, Flavio Corradini, Emanuela Merelli, Luca Tesei:

Multiscale Modelling: A Mobile Membrane Approach. - Nicolas Sedlmajer, Didier Buchs, Steve Hostettler, Alban Linard, Edmundo López Bóbeda, Alexis Marechal:

Modelling of Genetic Regulatory Mechanisms with GReg. - Jesse Alama, Daniel Kühlwein, Evgeni Tsivtsivadze, Josef Urban, Tom Heskes:

Premise Selection for Mathematics by Corpus Analysis and Kernel Methods. - Patryk Filipiak:

A Multiagent Simulation for Traffic Flow Management with Evolutionary Optimization. - Andreas Maurer, Massimiliano Pontil:

Structured Sparsity and Generalization. - Yifeng Gao, Shuhong Gong, Ge Zhao:

A Novel and Robust Evolution Algorithm for Optimizing Complicated Functions. - Andris Ambainis, Xiaoming Sun:

New separation between $s(f)$ and $bs(f)$. - (Withdrawn) Model for networks of spatial objects and simulation of geographical phenomena propagation.

- Yingjie Miao, Jason J. Corso:

Hamiltonian Streamline Guided Feature Extraction with Applications to Face Detection. - Rupak Majumdar, Elaine Render, Paulo Tabuada:

A theory of robust software synthesis. - Ersen Ekrem, Sennur Ulukus:

Secure Lossy Transmission of Vector Gaussian Sources. - Andrew Tausz, Gunnar E. Carlsson:

Applications of Zigzag Persistence to Topological Data Analysis. - Chengxi Ye, Charles H. Cannon, Zhanshan (Sam) Ma, Douglas W. Yu, Mihai Pop:

SparseAssembler2: Sparse k-mer Graph for Memory Efficient Genome Assembly. - Gabriel Ciobanu:

Proceedings of the 5th Workshop on Membrane Computing and Biologically Inspired Process Calculi (MeCBIC 2011). - Yu Xiang, Young-Han Kim:

Gaussian Channel with Noisy Feedback and Peak Energy Constraint. - Peng Zhong, Mai Vu:

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel. - Adrian Barbu:

Hierarchical Object Parsing from Noisy Point Clouds. - Phuong Nguyen, Peter Sunehag, Marcus Hutter:

Feature Reinforcement Learning In Practice. - Srecko Brlek:

Interactions between Digital Geometry and Combinatorics on Words. 1-12 - Anna E. Frid:

Infinite permutations vs. infinite words. 13-19 - Juha Kortelainen:

Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions. 22-29 - Benoît Rittaud, Laurent Vivier:

Circular words and applications. 31-36 - Golnaz Badkobeh, Maxime Crochemore:

Finite-Repetition threshold for infinite ternary words. 37-43 - Valérie Berthé, Sébastien Labbé:

Uniformly balanced words with linear complexity and prescribed letter frequencies. 44-52 - Stefano Bilotta, Elisa Pergola, Renzo Pinzani:

Pattern 1^j0^i avoiding binary words. 53-64 - Bastian Bischoff, Dirk Nowotka

:
Pattern Avoidability with Involution. 65-70 - Francine Blanchet-Sadri, Aleksandar Chakarov, Lucas Manuelli, Jarett Schwartz, Slater Stich:

Recurrent Partial Words. 71-82 - Fabio Burderi:

Monoids and Maximal Codes. 83-92 - Michaël Cadilhac

, Alain Finkel, Pierre McKenzie:
Bounded Parikh Automata. 93-102 - Stefano Crespi-Reghizzi

, Pierluigi San Pietro
:
From Regular to Strictly Locally Testable Languages. 103-111 - Daniel Dombek:

Substitutions over infinite alphabet generating (-β)-integers. 115-121 - Sébastien Ferenczi:

Dynamical generalizations of the Lagrange spectrum. 122-128 - Gabriele Fici

:
A Classification of Trapezoidal Words. 129-137 - Irina A. Gorbunova, Arseny M. Shur:

On Pansiot Words Avoiding 3-Repetitions. 138-146 - Vesa Halava, Tero Harju

, Tomi Kärki:
A new proof for the decidability of D0L ultimate periodicity. 147-151 - Thierry Monteil:

The complexity of tangent words. 152-157 - Hossein Nevisi

, Daniel Reidenbach:
Unambiguous 1-Uniform Morphisms. 158-167 - Elena A. Petrova

, Arseny M. Shur:
Constructing Premaximal Binary Cube-free Words of Any Level. 168-178 - Svetlana Puzynina, Luca Q. Zamboni:

Abelian returns in Sturmian words. 179-188 - Mathieu Roux, Brigitte Vallée:

Information theory: Sources, Dirichlet series, and realistic analyses of data structures. 199-214 - Aleksi Saarela

:
Systems of Word Equations and Polynomials: a New Approach. 215-225 - Matthew J. Samuel:

Word posets, with applications to Coxeter groups. 226-230 - Nikita Sidorov:

Optimizing Properties of Balanced Words. 240-246 - Wolfgang Steiner:

On the Delone property of (-β)-integers. 247-256 - Alexandr Valyuzhenich

:
Permutation complexity of the fixed points of some uniform binary morphisms. 257-264 - Steven Widmer:

Permutation Complexity Related to the Letter Doubling Map. 265-276 - Paul Cuff, Lei Zhao:

Coordination using Implicit Communication. - Steven Kelk, Céline Scornavacca:

Constructing minimal phylogenetic networks from softwired clusters is fixed parameter tractable. - Nan Li, Elena Dubrova:

AIG Rewriting Using 5-Input Cuts. - Philip Bille, Inge Li Gørtz:

Substring Range Reporting. - Wieslawa Sikora, Janusz Malinowski, Arkadiusz Kupczak:

Model of skyscraper evacuation with the use of space symmetry and fluid dynamic approximation. - Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Shahzad Ali Malik:

Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols. - Nadeem Javaid, Muti Ullah, Karim Djouani:

Identifying Design Requirements for Wireless Routing Link Metrics. - Nadeem Javaid, Muhammad Yousaf, Aamir Ahmad, Arshad Naveed, Karim Djouani:

Evaluating Impact of Mobility on Wireless Routing Protocols. - (Withdrawn) Doing Better Than UCT: Rational Monte Carlo Sampling in Trees.

- Minyue Li, Janusz Klejsa, W. Bastiaan Kleijn

:
On Distribution Preserving Quantization. - (Withdrawn) The Successive Approximation Approach for NUM Frameworks with Elastic and Inelastic Traffic.

- Mahdi Aliakbari, Massoud Pourmahdian:

Computational Models of Certain Hyperspaces of Quasi-metric Spaces. - Paul de Kerret, David Gesbert:

The Multiplexing Gain of the Network MIMO Channel With Distributed CSI. - Morgan Barbier

, Christophe Chabot, Guillaume Quintin:
On Quasi-Cyclic Codes as a Generalization of Cyclic Codes. - Vadim E. Levit, Eugen Mandrescu:

On the Intersection of All Critical Sets of a Unicyclic Graph. - Patryk Filipiak:

Self-Organizing Mixture Networks for Representation of Grayscale Digital Images. - Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff:

Asymptotically Optimal Downlink Scheduling over Markovian Fading Channels. - Romain Hollanders, Jean-Charles Delvenne, Raphaël M. Jungers:

Policy Iteration is well suited to optimize PageRank. - Rohit Aggarwal, Can Emre Koksal, Philip Schniter:

Scaling Laws and Design Principles for Multi-Cellular Wireless OFDMA Systems. - Marcelo Firer, Luciano Panek

, Laura L. Ramos Rifo:
Coding in the Presence of Semantic Value of Information: Unequal Error Protection Using Poset Decoders. - Chitta Baral, Juraj Dzifcak, Marcos Alvarez Gonzalez, Jiayu Zhou:

Using Inverse lambda and Generalization to Translate English to Formal Languages. - Chitta Baral, Juraj Dzifcak:

Language understanding as a step towards human level intelligence - automatizing the construction of the initial dictionary from example sentences. - Chitta Baral, Juraj Dzifcak:

Solving puzzles described in English by automated translation to answer set programming and learning how to do that translation. - Holger Petersen:

A SWAR Approach to Counting Ones. - Diomidis S. Michalopoulos, Nestor D. Chatzidiamantis, Robert Schober, George K. Karagiannidis:

The Diversity Potential of Relay Selection with Practical Channel Estimation. - Yunghsiang S. Han, Rong Zheng, Wai Ho Mow:

Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Storage. - Cunsheng Ding, Jing Yang:

Hamming Weights in Irreducible Cyclic Codes. - Ludo Waltman, Nees Jan van Eck:

The inconsistency of the h-index. - Tien Tuan Anh Dinh, Wenqiang Wang, Anwitaman Datta

:
City on the Sky: Flexible, Secure Data Sharing on the Cloud. - Hrishikesh Sharma, Sachin Patkar:

A Design Methodology for Folded, Pipelined Architectures in VLSI Applications using Projective Space Lattices. - Daohang Sha, James L. Patton, Ferdinando A. Mussa-Ivaldi:

Implicit learning of object geometry by reducing contact forces and increasing smoothness. - H. M. Clayton, D. H. Sha, D. R. Mullineaux:

Three-dimensional Torques and Power of Horse Forelimb Joints at Trot. - Thang N. Dinh, My T. Thai:

Finding Community Structure with Performance Guarantees in Complex Networks. - Ash Mohammad Abbas:

Multihop Adjustment for the Number of Nodes in Contention-Based MAC Protocols for Wireless Ad hoc Networks. - Daniel Lemire, André Vellino:

Extracting, Transforming and Archiving Scientific Data. - Timothy Wang, Romain Jobredeaux, Eric Feron:

A graphical environment to express the semantics of control systems. - Vitaly Klyuev, Yannis Haralambous:

Query Expansion: Term Selection using the EWC Semantic Relatedness Measure. - Thomas W. Lynch:

More Jabber about the Collatz Conjecture and a Closed Form for Detecting Cycles on Special Subsequences [Assertion: Collatz cycles]. - Majed Alresaini, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari, Michael J. Neely:

Backpressure with Adaptive Redundancy (BWAR). - Debiao He:

Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography. - Bas Luttik, Frank Valencia:

Proceedings 18th International Workshop on Expressiveness in Concurrency, EXPRESS 2011, Aachen, Germany, 5th September 2011. EPTCS 64, 2011 [contents] - Jason J. Corso:

Toward Parts-Based Scene Understanding with Pixel-Support Parts-Sparse Pictorial Structures. - Aram Ter-Sarkisov, Stephen R. Marsland:

Convergence Properties of Two (μ + λ) Evolutionary Algorithms On OneMax and Royal Roads Test Functions. - Aram Ter-Sarkisov, Stephen R. Marsland:

Convergence of a Recombination-Based Elitist Evolutionary Algorithm on the Royal Roads Test Function. - Partha Pratim Ray:

OSD: A Source Level Bug Localization Technique Incorporating Control Flow and State Information in Object Oriented Program. - Chao-Kai Wen, Guangming Pan, Kai-Kit Wong, Meihui Guo, Jung-Chieh Chen:

A Deterministic Equivalent for the Analysis of Non-Gaussian Correlated MIMO Multiple Access Channels. - Firouz Abdullah Al-Wassai, N. V. Kalyankar, Ali A. Al-Zaky:

Multisensor Images Fusion Based on Feature-Level. - Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal:

A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security. - François Baccelli, Fabien Mathieu

, Ilkka Norros:
Performance of P2P Networks with Spatial Interactions of Peers. - Robert E. Kent:

The Information Flow Framework: A Descriptive Category Metatheory. - Pierre Baldi, Sholeh Forouzan, Zhiqin Lu:

Complex-Valued Autoencoders. - Suman Banik, Bibhash Roy, Parthi Dey, Nabendu Chaki, Sugata Sanyal:

QoS Routing using OLSR with Optimization for Flooding. - Amrita Dey, Nabendu Chaki, Sugata Sanyal:

Modeling Smart Grid using Generalized Stochastic Petri Net. - Moshe Babaioff, Shaddin Dughmi, Robert Kleinberg, Aleksandrs Slivkins:

Dynamic Pricing with Limited Supply. - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:

On the Network-Wide Gain of Memory-Assisted Source Coding. - Xuebin Wu, Zhiyuan Yan:

Computational Complexity of Cyclotomic Fast Fourier Transforms over Characteristic-2 Fields. - Cong Sun

, Liyong Tang, Zhong Chen:
A New Enforcement on Declassification with Reachability Analysis. - Jean-Louis Dessalles:

Biomimetic use of genetic algorithms. - Yoshinobu Kawahara, Takashi Washio:

Prismatic Algorithm for Discrete D.C. Programming Problems. - Thomas Wolf:

A Dynamical Systems Approach for Static Evaluation in Go. - Graham H. Norton:

On Sequences with a Perfect Linear Complexity Profile. - Guoqiang Mao:

Research on Wireless Multi-hop Networks: Current State and Challenges. - Ndaohialy Manda-Vy Ravonimanantsoa, Paul Auguste Randriamitantsoa:

Comparison Of The Consumption Of Resources Between HTTP And SIP. - Thomas Braibant:

Coquet: a Coq library for verifying hardware. - Shenghao Yang, Siu-Wai Ho, Jin Meng, En-hui Yeung:

Symmetric Properties and Subspace Degradations of Linear Operator Channels over Finite Fields. - Eric Bonabeau, Jean-Louis Dessalles:

Detection and emergence. - Jean-Louis Dessalles:

Why is language well-designed for communication? (Commentary on Christiansen and Chater: 'Language as shaped by the brain'). - Wonyeol Lee, Young Woo Kim, Se Yun Kim, Jae Young Lim, Dong Hoon Lim:

Edge detection based on morphological amoebas. - Boris Aronov, Dmitriy Drusvyatskiy:

Complexity of a Single Face in an Arrangement of s-Intersecting Curves. - Mohammed El-Kebir, Jaap Heringa, Gunnar W. Klau:

Lagrangian Relaxation Applied to Sparse Global Network Alignment. - Alberto Pepe:

The relationship between acquaintanceship and coauthorship in scientific collaboration networks. - Filip Maric, Predrag Janicic

:
Formalization of Abstract State Transition Systems for SAT. - Carsten Witt:

Tight Bounds on the Optimization Time of the (1+1) EA on Linear Functions. - Jérémy Barbay, Gonzalo Navarro:

On Compressing Permutations and Adaptive Sorting. - Harold Roberto Martinez Salazar, Juan Pablo Carbajal:

Exploiting the Passive Dynamics of a Compliant Leg to Develop Gait Transitions. - Dorothea Baumeister, Jörg Rothe:

Taking the Final Step to a Full Dichotomy of the Possible Winner Problem in Pure Scoring Rules. - Curtis Menton, Preetjot Singh:

Manipulation Can Be Hard in Tractable Voting Systems Even for Constant-Sized Coalitions. - Matej Hoffmann, Juan Pablo Carbajal, Marc Ziegler:

SNF Project Locomotion: Final report 2009-2010. - Matej Hoffmann, Juan Pablo Carbajal, Marc Ziegler:

SNF Project Locomotion: Progress report 2008-2009. - Juan Pablo Carbajal, Naveen Kuppuswamy:

Magneto-mechanical actuation model for fin-based locomotion. - Tongjiang Yan:

Linear Complexity of Ding-Helleseth Generalized Cyclotomic Binary Sequences of Any Order. - Luca Aceto, Ignacio Fábregas

, David de Frutos-Escrig
, Anna Ingólfsdóttir, Miguel Palomino
:
Graphical representation of covariant-contravariant modal formulae. 1-15 - Sara Capecchi

, Ilaria Castellani
, Mariangiola Dezani-Ciancaglini
:
Information Flow Safety in Multiparty Sessions. 16-30 - Flavio Corradini, Maria Rita Di Berardini, Walter Vogler:

Read Operators and their Expressiveness in Process Algebras. 31-43 - Ugo Dal Lago

, Paolo Di Giamberardino:
Soft Session Types. 59-73 - Damian Nadales Agut, Michel A. Reniers

:
Linearization of CIF Through SOS. 74-88 - Kirstin Peters

, Jens-Wolfhard Schicke, Uwe Nestmann:
Synchrony vs Causality in the Asynchronous Pi-Calculus. 89-103 - Iain Phillips

, Irek Ulidowski
:
A Logic with Reverse Modalities for History-preserving Bisimulations. 104-118 - Jens-Wolfhard Schicke, Kirstin Peters

, Ursula Goltz:
Synchrony vs. Causality in Asynchronous Petri Nets. 119-131 - Wei-Chiang Li, Tsung-Hui Chang, Che Lin, Chong-Yung Chi:

Coordinated Beamforming for Multiuser MISO Interference Channel under Rate Outage Constraints. - Mehdi Karimi, Amir H. Banihashemi:

An Efficient Algorithm for Finding Dominant Trapping Sets of LDPC Codes. - Thomas Wolf:

The Parametric Solution of Underdetermined linear ODEs. - Robert Crowston, Gregory Z. Gutin, Mark Jones, Venkatesh Raman, Saket Saurabh:

Parameterized Complexity of MaxSat Above Average. - Shaoshi Chen, Manuel Kauers:

Trading Order for Degree in Creative Telescoping. - Yanwei Xu:

Scalable Continual Top-k Keyword Search in Relational Databases. - Jun He, Tianshi Chen:

Population Scalability Analysis of Abstract Population-based Random Search: Spectral Radius. - Meir Perez, Tshilidzi Marwala:

The fuzzy gene filter: A classifier performance assesment. - William Harrison:

Language Support for Declarative Future Commitments. - J. L. Mpanza, Tshilidzi Marwala:

Ant Colony Optimization of Rough Set for HV Bushings Fault Detection. - Mlungisi Duma, Bhekisipho Twala, Tshilidzi Marwala:

Improving the performance of the ripper in insurance risk classification : A comparitive study using feature selection. - Elad Hazan, Tomer Koren:

Optimal Algorithms for Ridge and Lasso Regression with Partially Observed Attributes. - Stefanie Wuhrer, Chang Shu, Prosenjit Bose:

Automatically Creating Design Models from 3D Anthropometry Data. - Benjamin Nguyen, Antoine Vion, François-Xavier Dudouet, Dario Colazzo, Ioana Manolescu, Pierre Senellart:

XML content warehousing: Improving sociological studies of mailing lists and web data. - Mong-Jen Kao, D. T. Lee:

Capacitated Domination: Constant Factor Approximation for Planar Graphs. - Tianrong Lin:

On commutativity of quantum weakest preconditions. - J. L. Mpanza, Tshilidzi Marwala:

Artificial Neural Network and Rough Set for HV Bushings Condition Monitoring. - (Withdrawn) Sparse Approximation is Hard.

- David Eppstein, Michael T. Goodrich, Maarten Löffler, Darren Strash, Lowell Trott:

Category-Based Routing in Social Networks: Membership Dimension and the Small-World Phenomenon (Short). - Reza Moazzez Estanjini, Xu Chu Ding, Morteza Lahijanian, Jing Wang, Calin Belta, Ioannis Ch. Paschalidis:

Least Squares Temporal Difference Actor-Critic Methods with Applications to Robot Motion Control. - Michael J. Bannister, David Eppstein:

Hardness of Approximate Compaction for Nonplanar Orthogonal Graph Drawings. - Stephen Chang, John Clements, Eli Barzilay, Matthias Felleisen:

Stepping Lazy Programs. - Yao Xie, Deniz Gündüz, Andrea J. Goldsmith:

The Diversity-Multiplexing-Delay Tradeoff in MIMO Multihop Networks with ARQ. - Jie Ren, Kai-Kit Wong, Jianjun Hou:

Self-Optimized OFDMA via Multiple Stackelberg Leader Equilibrium. - Bach Q. Ha, Jason D. Hartline:

Mechanism Design via Consensus Estimates, Cross Checking, and Profit Extraction. - Céline Blondeau, Anne Canteaut, Pascale Charpin:

Differential properties of functions x -> x^{2^t-1} -- extended version. - Ivan Zuzak, Marko Ivankovic

, Ivan Budiselic:
A Classification Framework for Web Browser Cross-Context Communication. - Fredrik Johansson:

A fast algorithm for reversion of power series. - Karthik Subbian, Prem Melville:

Supervised Rank Aggregation for Predicting Influence in Networks. - Gregory Z. Gutin, Anders Yeo:

Constraint Satisfaction Problems Parameterized Above or Below Tight Bounds: A Survey. - Wolfgang Dvorák, Michael Morak, Clemens Nopp, Stefan Woltran:

dynPARTIX - A Dynamic Programming Reasoner for Abstract Argumentation. - William Harrison, Tim Walsh, Paul Biggar:

Some Measurements of Nullable and Non-Nullable Parameter Declarations in Relation to Software Malleability. - Jerome K. Vanclay:

Publication patterns of award-winning forest scientists and implications for the ERA journal ranking. - Jean-Louis Dessalles:

Simplicity Effects in the Experience of Near-Miss. - Toshinori Oaku:

Algorithms for integrals of holonomic functions over domains defined by polynomial inequalities. - Jean-Louis Dessalles:

Emotion in good luck and bad luck: predictions from simplicity theory. - Jean-Louis Dessalles:

A structural model of intuitive probability. - Christoph Wernhard:

Computing with Logic as Operator Elimination: The ToyElim System. - Ynte Vanderhoydonc, Wim Vanroose:

Numerical extraction of a macroscopic pde and a lifting operator from a lattice Boltzmann model. - Wolfgang Dvorák, Sarah Alice Gaggl, Johannes Peter Wallner, Stefan Woltran:

Making Use of Advances in Answer-Set Programming for Abstract Argumentation Systems. - András Antos, Gábor Bartók, Csaba Szepesvári:

Non-trivial two-armed partial-monitoring games are bandits. - Md. Shafiul Alam, Asish Mukhopadhyay:

Algorithms for the Problems of Length-Constrained Heaviest Segments. - Alexandre L. M. Levada:

On the Spatial Dependence Structure of Isotropic Pairwise Gaussian-Markov Random Field Models. - Michael M. Tchaikovsky, Alexander P. Kurdyukov, Victor N. Timin:

Synthesis of anisotropic suboptimal controllers via convex optimization. - Justin Ward:

A $(k + 3)/2$-approximation algorithm for monotone submodular maximization over a $k$-exchange system. - Yoshitaka Kameya, Satoru Nakamura, Tatsuya Iwasaki, Taisuke Sato:

Verbal Characterization of Probabilistic Clusters using Minimal Discriminative Propositions. - Maxime Amblard, Michel Musiol, Manuel Rebuschi

:
Une analyse basée sur la S-DRT pour la modélisation de dialogues pathologiques. - Sai Qian, Maxime Amblard:

Event in Compositional Dynamic Semantics. - Saeedeh Parsaeefard, Mihaela van der Schaar, Ahmad R. Sharafat:

Robust Stackelberg game in communication systems. - Maxime Amblard:

Encoding Phases using Commutativity and Non-commutativity in a Logical Framework. - Zai Yang, Cishen Zhang, Jun Deng, Wenmiao Lu:

Orthonormal Expansion ℓ1-Minimization Algorithms for Compressed Sensing. - Soura Dasgupta, Guoqiang Mao:

On the Quality of Wireless Network Connectivity. - Romain Beauxis, Samuel Mimram:

A Non-Standard Semantics for Kahn Networks in Continuous Time. - Marcin Kik:

RBO Protocol: Broadcasting Huge Databases for Tiny Receivers. - Maxime Amblard

:
Minimalist Grammars and Minimalist Categorial Grammars, definitions toward inclusion of generated languages. - Byung Gyun Kang, Hyun Kwang Kim, Phan Thanh Toan:

Improved Linear Programming Bounds on Sizes of Constant-Weight Codes. - Michael M. Tchaikovsky, Alexander P. Kurdyukov, Victor N. Timin:

A convex formulation of strict anisotropic norm bounded real lemma. - Haiyi Zhu, Bernardo A. Huberman, Yarun Luon:

To Switch or Not To Switch: Understanding Social Influence in Recommender Systems. - Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar:

CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity. - Gadiel Seroussi, Wojciech Szpankowski, Marcelo J. Weinberger:

Deinterleaving Finite Memory Processes via Penalized Maximum Likelihood. - Yoram Bachrach, Pushmeet Kohli, Vladimir Kolmogorov, Morteza Zadimoghaddam:

Optimal Coalition Structures in Graph Games. - Abdul-Khaaliq Mohamed, Tshilidzi Marwala, L. R. John:

Single-trial EEG Discrimination between Wrist and Finger Movement Imagery and Execution in a Sensorimotor BCI. - Bay Vo, Bac Le:

A Frequent Closed Itemsets Lattice-based Approach for Mining Minimal Non-Redundant Association Rules. - Monika Adamova, Ján Sefránek:

Transfer of semantics from argumentation frameworks to logic programming A preliminary report. - Andrei A. Bulatov, Martin E. Dyer, Leslie Ann Goldberg, Mark Jerrum:

Log-supermodular functions, functional clones and counting CSPs. - Robert M. Hierons

:
Checking Finite State Machine Conformance when there are Distributed Observations. - Risheng Liu, Zhouchen Lin, Siming Wei, Zhixun Su:

Solving Principal Component Pursuit in Linear Time via $l_1$ Filtering. - David Eppstein, Joseph A. Simons:

Confluent Hasse diagrams. - Hector Zenil, Jean-Paul Delahaye:

Un metodo estable para la evaluacion de la complejidad algoritmica de cadenas cortas. - José Antonio Martín H.:

A parametric-complexity exact 3-(UN)COLORING Algorithm. - Tanaeem M. Moosa, Sumaiya Nazeen, M. Sohel Rahman, Rezwana Reaz:

Linear Time Inference of Strings from Cover Arrays using a Binary Alphabet. - Kishore Angrishi, Ulrich Killat:

On the Linear Scaling of Stochastic Performance Bounds in Network Calculus. - Onofrio Febbraro, Nicola Leone, Kristian Reale, Francesco Ricca:

Unit Testing in ASPIDE. - Andreas Behrend:

A Uniform Fixpoint Approach to the Implementation of Inference Methods for Deductive Databases. - Tomas Gavenciak, Daniel Král, Sang-il Oum:

Deciding first order logic properties of matroids. - Zahi Jarir, Mohamed Quafafou, Mohammed Erradi:

Personalized Web Services for Web Information Extraction. - Supriya Chakraborty, Nabendu Chaki:

Quality Evaluation of Conceptual Level Object Multidimensional Data Model. - Li Yan, Marek Chrobak:

New Results on the Fault-Tolerant Facility Placement Problem. - Shan Zhou, Xinzhou Wu, Lei Ying:

Distributed Power Control and Coding-Modulation Adaptation in Wireless Networks using Annealed Gibbs Sampling. - Fernando Hernando, Kyle Marshall, Michael E. O'Sullivan:

The Dimension of Subcode-Subfields of Shortened Generalized Reed Solomon Codes. - Massimo Melucci:

Improving Ranking Using Quantum Probability. - Ziaul Hasan, Hamidreza Boostanimehr, Vijay K. Bhargava:

Green Cellular Networks: A Survey, Some Research Issues and Challenges. - Dan Xu, Xin Liu:

Geographic Trough Filling for Internet Datacenters. - Ifat Jahangir, Anindya Das, Masud Hasan:

Formulation and Development of a Novel Quaternary Algebra. - Wajeb Gharibi, Omar Saeed Al-Mushayt:

A Note on Separable Nonlinear Least Squares Problem. - Yu Zhang, Mihaela van der Schaar:

Strategic Learning and Robust Protocol Design for Online Communities with Selfish Users. - Manoj Gupta, Yogish Sabharwal, Sandeep Sen:

The update complexity of selection and related problems. - Hao Peng, Songnian Lu, Dandan Zhao, Aixin Zhang, Jianhua Li:

An Anti-attack Model Based on Complex Network Theory in P2P networks. - Serge Kernbach, Oliver Scholz, Kanako Harada, Sergej Popesku, Jens Liedke, Raja Humza, Wenguo Liu, Fabio Caparrelli, Jaouhar Jemai, Jiri Havlik, Eugen Meister, Paul Levi:

Multi-Robot Organisms: State of the Art. - Misha Stepanov:

Instantons causing iterative decoding to cycle. - Yuliya Lierler, Peter Schüller:

Parsing Combinatory Categorial Grammar with Answer Set Programming: Preliminary Report. - Massimo Melucci:

Getting Beyond the State of the Art of Information Retrieval with Quantum Theory. - Denny Schneeweiss, Petra Hofstedt:

FdConfig: A Constraint-Based Interactive Product Configurator. - Abhishek Taneja, R. K. Chauhan:

A Performance Study of Data Mining Techniques: Multiple Linear Regression vs. Factor Analysis. - Bernd Braßel, Michael Hanus, Björn Peemöller, Fabian Reck:

Implementing Equational Constraints in a Functional Language. - Karanjit Singh, Shuchita Bhasin:

Modification of GTD from Flat File Format to OLAP for Data Mining. - Mardavij Roozbehani, Alexandre Megretski, Eric Feron:

Optimization of Lyapunov Invariants in Verification of Software Systems (Extended Version). - Donny K. Sutantyo, Serge Kernbach, Valentin A. Nepomnyashchikh, Paul Levi:

Multi-Robot Searching Algorithm Using Levy Flight and Artificial Potential Field. - Thomas Eiter, Thomas Krennwallner, Christoph Redl:

Nested HEX-Programs. - Serge Kernbach, Thomas Schmickl, Jon Timmis:

Collective Adaptive Systems: Challenges Beyond Evolvability. - Stef De Pooter, Johan Wittocx, Marc Denecker:

A prototype of a knowledge-based programming environment. - Gabriel Dulac-Arnold, Ludovic Denoyer, Philippe Preux, Patrick Gallinari:

Datum-Wise Classification: A Sequential Approach to Sparsity. - Maria-Florina Balcan, Florin Constantin, Satoru Iwata, Lei Wang:

Learning Valuation Functions. - Jeevan H. E., Prashanth P. P., Punith Kumar S. N., Vinay Hegde:

Web Pages Clustering: A New Approach. - Boumedyen, Kaneez, Rafael, Victor:

E- Learning: An effective pedagogical tool for learning. - Usman Ali, Pierre Duhamel, Michel Kieffer:

Sliding Trellis-Based Frame Synchronization. - Manel Abid, Michel Kieffer, Béatrice Pesquet-Popescu:

Consistent Reconstruction of the Input of an Oversampled Filter Bank From Noisy Subbands. - Mark Schmidt, Karteek Alahari:

Generalized Fast Approximate Energy Minimization via Graph Cuts: Alpha-Expansion Beta-Shrink Moves. - Pierre-Yves Angrand, Jacques Sakarovitch:

On the enumerating series of an abstract numeration system. - Lilyana Mihalkova, Walaa Eldin Moustafa:

Structure Selection from Streaming Relational Data. - Michael Nölle, Martin Suda:

Conjugate Variables as a Resource in Signal and Image Processing. - Gabriele Oliva, Stefano Panzieri, Roberto Setola:

On the Stability of Linear Discrete-Time Fuzzy Systems. - Manoel B. Campêlo, Ricardo C. Corrêa, Phablo F. S. Moura, Marcio Costa Santos:

Optimal k-fold colorings of webs and antiwebs. - Alexandre Miguel Pinto

, Luís Moniz Pereira:
Each normal logic program has a 2-valued Minimal Hypotheses semantics. - Caleb T. Phillips, Rhonda Hoenigman, Becky Higbee:

Food Redistribution as Optimization. - Massimo Melucci:

Probability Ranking in Vector Spaces. - Jianqin Zhou, Wanquan Liu:

The $k$-error linear complexity distribution for $2^n$-periodic binary sequences. - Christoph Beierle, Gabriele Kern-Isberner, Karl Södler:

A Constraint Logic Programming Approach for Computing Ordinal Conditional Functions. - Rio Yokota, Lorena A. Barba:

Fast N-body Simulations on GPUs. - Geoffrey Irving:

Banded Householder representation of linear subspaces. - Katsumi Inoue, Chiaki Sakama, Lena Wiese:

Confidentiality-Preserving Data Publishing for Credulous Users by Extended Abduction. - Mai Nguyen, Tomi Janhunen, Ilkka Niemelä:

Translating Answer-Set Programs into Bit-Vector Logic. - Loet Leydesdorff, Tobias Opthof:

A Rejoinder on Energy versus Impact Indicators. - Vincent Toubiana, Vincent Verdot:

Show Me Your Cookie And I Will Tell You Who You Are. - Jie Xu, Mihaela van der Schaar, William R. Zame:

Designing Exchange for Online Communities. - Felice Manganiello, Anna-Lena Trautmann:

Spread Decoding in Extension Fields. - Antonios Argyriou:

Coordinating Interfering Transmissions in Cooperative Wireless LANs. - Atish Das Sarma, Amitabh Trehan:

Edge-preserving self-healing: keeping network backbones densely connected. - Shailesh Vaya:

Information Dissemination in Unknown Radio networks with Large Labels. - Xishun Zhao, Yuping Shen:

Proof System for Plan Verification under 0-Approximation Semantics. - Pawel Weronski, Julian Sienkiewicz, Georgios Paltoglou, Kevan Buckley, Mike Thelwall

, Janusz A. Holyst:
Emotional Analysis of Blogs and Forums Data. - Ioannis Z. Emiris, Vissarion Fisikopoulos, Christos Konaxis, Luis Mariano Peñaranda:

Efficient Computation of Newton Polytopes of Specialized Resultants. - Joan Serrà, Massimiliano Zanin, Perfecto Herrera, Xavier Serra:

Characterization and exploitation of community structure in cover song networks. - Markus Triska:

Domain-specific Languages in a Finite Domain Constraint Programming System. - Novarun Deb, Manali Chakraborty, Nabendu Chaki:

A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks. - Jim Gemmell, Benjamin I. P. Rubinstein, Ashok K. Chandra:

Improving Entity Resolution with Global Constraints. - Shay Solomon, Michael Elkin:

Balancing Degree, Diameter and Weight in Euclidean Spanners. - (Withdrawn) Multi-Unit Auction with Diminishing Marginal Valuations and Capacities.

- Nebojsa Milosavljevic, Sameer Pawar, Salim Y. El Rouayheb, Michael Gastpar, Kannan Ramchandran:

Optimal Deterministic Polynomial-Time Data Exchange for Omniscience. - Leenhapat Navaravong, John M. Shea, Eduardo L. Pasiliao Jr., Gregory L. Barnette, Warren E. Dixon:

Optimizing Network Topology to Reduce Aggregate Traffic in Systems of Mobile Robots. - Dean P. Foster, Alexander Rakhlin:

No Internal Regret via Neighborhood Watch. - Conrad Drescher, Inês Lynce, Ralf Treinen:

Proceedings Second Workshop on Logics for Component Configuration, LoCoCo 2011, Perugia, Italy, 12th September 2011. EPTCS 65, 2011 [contents] - Manuel González Sarabia, Carlos Rentería-Márquez, Eliseo Sarmiento Rosales:

On the Main Parameters of Parameterized Codes. - Wee-Peng Tay:

The Value of Feedback in Decentralized Detection. - Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft:

Private Decayed Sum Estimation under Continual Observation. - Shiqiang Wang, Qingyang Song, Xingwei Wang, Abbas Jamalipour:

Distributed MAC Protocol Supporting Physical-Layer Network Coding. - Michael Unser, Pouya Dehghani Tafti, Qiyu Sun:

A unified formulation of Gaussian vs. sparse stochastic processes - Part I: Continuous-domain theory. - Michael Unser, Pouya Dehghani Tafti, Arash Amini, Hagai Kirshner:

A unified formulation of Gaussian vs. sparse stochastic processes - Part II: Discrete-domain theory. - Eugen Meister, Sergej Stepanenko, Serge Kernbach:

Adaptive Locomotion of Multibody Snake-like Robot. - Olav Geil, Casper Thomsen:

Weighted Reed-Muller codes revisited. - Ruchi Tuli, Parveen Kumar:

Analysis of Recent Checkpointing Techniques for Mobile Computing Systems. - Penying Rochanakul:

Two-Level Fingerprinting Codes: Non-Trivial Constructions. - G. Koteswara Rao, Shubhamoy Dey:

Decision Support for e-Governance: A Text Mining Approach. - Norbert Manthey:

Coprocessor - a Standalone SAT Preprocessor. - Alessandro Lazaric, Marcello Restelli:

Transfer from Multiple MDPs. - Mark Sh. Levin

:
Towards Configuration of applied Web-based information system. - Alfredo Braunstein, Farbod Kayhan, Riccardo Zecchina:

Efficient data compression from statistical physics of codes over finite fields. - Emil Jerábek:

Blending margins. - Md. Mahedi Hassan

, Poo Kuan Hoong:
Integrated Solution Scheme for Handover Latency Diminution in Proxy Mobile IPv6. - Girish N. Nair:

Structural Routability of n-Pairs Information Networks. - Emil Jerábek:

The complexity of admissible rules of Lukasiewicz logic. - Rainer Lüdecke:

Every Formula-Based Logic Program Has a Least Infinite-Valued Model. - Chunxi Li, Changjia Chen, DahMing Chiu:

Compression and Quantitative Analysis of Buffer Map Message in P2P Streaming System. - Chunxi Li, Changjia Chen, DahMing Chiu:

Buffer Map Message Compression Based on Relevant Window in P2P Streaming Media System. - L. R. Sudha, R. Bhavani:

Biometric Authorization System using Gait Biometry. - Zenglin Xu, Feng Yan, Yuan (Alan) Qi:

InfTucker: t-Process based Infinite Tensor Decomposition. - Muhammad Yasir Malik, Jong-Seon No:

Dynamic MDS Matrices for Substantial Cryptographic Strength. - Eraldo Pereira Marinho, Carmen Maria Andreazza:

Anisotropic k-Nearest Neighbor Search Using Covariance Quadtree. - Urs Niesen, Bobak Nazer, Phil Whiting:

Computation Alignment: Capacity Approximation without Noise Accumulation. - Olaf Hartig, Johann Christoph Freytag:

Foundations of Traversal Based Query Execution over Linked Data (Extended Version). - Stefano Beretta, Paola Bonizzoni, Gianluca Della Vedova, Raffaella Rizzi:

Predicting Variants of Alternative Splicing from NGS data without the Genome. - Ondrej Bílka, Jozef Jirásek, Pavel Klavík, Martin Tancer, Jan Volec:

On the Complexity of Planar Covering of Small Graphs. - Shiyao Chen, Lang Tong, Qing Zhao:

Delay Optimal Multichannel Opportunistic Access. - Xiongping Dai, Yu Huang, Mingqing Xiao:

Stability Criteria via Common Non-strict Lyapunov Matrix for Discrete-time Linear Switched Systems. - Richard P. Brent, David Harvey:

Fast computation of Bernoulli, Tangent and Secant numbers. - Pavel Chigansky, Fima C. Klebaner:

The Euler-Maruyama approximation for the absorbtion times. - Gitta Kutyniok, Wang-Q Lim, Xiaosheng Zhuang:

Digital Shearlet Transform. - Sevag Gharibian, Jamie Sikora, Sarvagya Upadhyay:

QMA variants with polynomially many provers. - Takamitsu Watanabe:

Snowflake-type network to minimize synchronization cost. - Yves de Saá Guerra, Juan Manuel Martín González, Samuel Sarmiento Montesdeoca, David Rodríguez Ruiz, Nieves Arjonilla López, Juan Manuel García Manso:

Basketball scoring in NBA games: an example of complexity. - Ping Li, Arnd Christian König:

Accurate Estimators for Improving Minwise Hashing and b-Bit Minwise Hashing. - Martin Jaggi:

Convex Optimization without Projection Steps. - (Withdrawn) Technical Report: Modeling of Composite Piezoelectric Structures with the Finite Volume Method.

- Richard A. Blythe:

Neutral evolution: A null model for language dynamics. - Stanislao Gualdi, Chi Ho Yeung, Yi-Cheng Zhang:

Tracing the Evolution of Physics on the Backbone of Citation Networks. - Naoki Masuda:

Clustering in large networks does not promote upstream reciprocity. - Matthew de Brecht:

Quasi-Polish Spaces. - John R. Mahoney, Christopher J. Ellison, Ryan G. James, James P. Crutchfield:

How Hidden are Hidden Processes? A Primer on Crypticity and Entropy Convergence. - Zhouchen Lin:

Some Software Packages for Partial SVD Computation. - Ke Deng

, Ke Hu, Yi Tang:
Evolving network models under a dynamic growth rule. - Charo I. Del Genio, Thilo Gross:

Emergent bipartiteness in a society of knights and knaves. - Mario S. Mommer, Andreas Sommer, Johannes P. Schlöder, Hans Georg Bock:

A nonlinear preconditioner for experimental design problems. - Dag Roar Hjelme, Lars Lydersen, Vadim Makarov:

Quantum cryptography. - Steve Hanneke:

Activized Learning: Transforming Passive to Active with Improved Label Complexity. - Petter Holme, Jari Saramäki:

Temporal Networks. - Tom Bohman, Alan M. Frieze, Eyal Lubetzky:

Random greedy triangle-packing beyond the 7/4 barrier. - Zhi-Xi Wu, Petter Holme:

Onion structure and network robustness. - Ajay Deep Kachhvah, Neelima Gupte:

Avalanche transmission and critical behavior in load bearing hierarchical networks. - Piotr Gawron, Jerzy Klamka, Ryszard Winiarczyk:

Noise effects in the quantum search algorithm from the computational complexity point of view. - Alessandro Chiesa, Michael A. Forbes:

Improved Soundness for QMA with Multiple Provers. - Christoph Koutschan

:
Lattice Green's Functions of the Higher-Dimensional Face-Centered Cubic Lattices. - Yasuhito Tanaka:

Brouwer's fixed point theorem with sequentially at most one fixed point. - James R. Lee, Arnaud de Mesmay, Mohammad Moharrami:

Dimension reduction for finite trees in L_1. - Ricardo López-Ruiz, Jaime Sanudo:

Heisenberg uncertainty relation and statistical measures in the square well. - David L. Yonge-Mallo:

Adversary lower bounds in the Hamiltonian oracle model. - Yuliy M. Baryshnikov, Vadim Zharnitsky:

Search on the Brink of Chaos. - Stuart Weston, Timothy Natusch, Sergei Gulyaev:

Radio Astronomy Data Transfer and eVLBI using KAREN. - Dmitry Khlopin:

The transversality conditions in infinite horizon problems and the stability of adjoint variable. - Carsten Lemmen:

Malthusian assumptions lead to Boserupian phenology in a global model of the transitions to agriculture. - Guido Caldarelli, Matthieu Cristelli, Andrea Gabrielli, Luciano Pietronero, Antonio Scala, Andrea Tacchella:

Ranking and clustering countries and their products; a network analysis. - Edoardo Di Napoli, Stefan Blügel, Paolo Bientinesi:

Correlations in sequences of generalized eigenproblems arising in Density Functional Theory. - Chris Whidden, Robert G. Beiko, Norbert Zeh:

Fixed-Parameter and Approximation Algorithms for Maximum Agreement Forests. - Henry Cohn, Nadia Heninger:

Approximate common divisors via lattices. - Ali Kakhbod:

Market Mechanisms with Non-Price-Taking Agents. - Florent Foucaud

, Iiro S. Honkala, Tero Laihonen, Aline Parreau, Guillem Perarnau:
Locally identifying colourings for graphs with given maximum degree. - M. C. F. Donkers, Paulo Tabuada, W. P. M. H. Heemels:

On the Minimum Attention and the Anytime Attention Control Problems for Linear Systems: A Linear Programming Approach. - Greg Leibon, Scott D. Pauls, Daniel N. Rockmore, Robert Savell:

Partition Decomposition for Roll Call Data. - Miguel Á. Carreira-Perpiñán, Geoffrey J. Goodhill:

Generalised elastic nets. - Ajay Deep Kachhvah, Neelima Gupte:

Transmission of packets on a hierarchical network: Statistics and explosive percolation. - Matilde Marcolli, Ryan Thorngren:

Thermodynamic Semirings. - Adrian Kent:

Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes. - Ethan Fetaya:

Homological Error Correcting Codes and Systolic Geometry. - Roman Muraviev:

Additive habits with power utility: Estimates, asymptotics and equilibrium. - Jake V. Bouvrie, Boumediene Hamzi:

Model Reduction for Nonlinear Control Systems using Kernel Subspace Methods. - Indraneel Mukherjee, Robert E. Schapire:

A theory of multiclass boosting. - Helena Sofia Rodrigues, M. Teresa T. Monteiro, Delfim F. M. Torres:

Optimal control of a dengue epidemic model with vaccination. - Robert Granger, Andrew Moss:

Generalised Mersenne Numbers Revisited. - Yuliy M. Baryshnikov, Peter Bubenik, Matthew Kahle:

Min-type Morse theory for configuration spaces of hard spheres. - Guimei Zhu, Huijie Yang, Chuanyang Yin, Baowen Li:

Localizations on Complex Networks. - Eddie C. M. Hui, Hua Xiao:

Differential games of partial information forward-backward doubly stochastic differential equations and applications. - Souhaib Ben Taieb, Gianluca Bontempi, Amir F. Atiya, Antti Sorjamaa:

A review and comparison of strategies for multi-step ahead time series forecasting based on the NN5 forecasting competition. - Vladimir P. Gerdt, Amir Hashemi, Benyamin M.-Alizadeh:

A Variant of Gerdt's Algorithm for Computing Involutive Bases. - William I. Gasarch:

An Application of Ramsey's Theorem to Proving Programs Terminate (An Exposition). - Rafal Nowak:

On the convergence acceleration of some continued fractions. - Miguel Lázaro-Gredilla, Steven Van Vaerenbergh, Neil D. Lawrence

:
Overlapping Mixtures of Gaussian Processes for the Data Association Problem. - Shinji Tanimoto:

Natural growth model of weighted complex networks. - Rongjun Wu, Shaofang Hong:

On deep holes of standard Reed-Solomon codes. - Emil Saucan:

Fat Triangulations and Differential Geometry. - Marcus Brazil, Charl J. Ras, Doreen A. Thomas:

The bottleneck 2-connected $k$-Steiner network problem for $k\leq 2$. - Stanislao Gualdi, Matús Medo, Yi-Cheng Zhang:

Influence, originality and similarity in directed acyclic graphs. - Omid Kavehei, Said F. Al-Sarawi, Sharath Sriram, Madhu Bhaskaran, Derek Abbott:

High Density and Non-volatile CRS-based CAM. - Khodakhast Bibak:

Additive combinatorics: with a view towards computer science and cryptography - An exposition. - Xin Zhang, Guizhen Liu, Jianliang Wu:

Edge covering pseudo-outerplanar graphs with forests. - Rory B. B. Lucyshyn-Wright:

Totally distributive categories and injective toposes. - Shaun Lichter, Terry L. Friesz, Christopher Griffin:

Collaborative Network Formation in Spatial Oligopolies. - Shaun Lichter, Christopher Griffin, Terry L. Friesz:

Calculating the Price of Anarchy for Network Formation Games. - Omid Kavehei, Said F. Al-Sarawi, Kyoung-Rok Cho, Nicolangelo Iannella, Sung-Jin Kim, Kamran Eshraghian, Derek Abbott:

Memristor-based Synaptic Networks and Logical Operations Using In-Situ Computing. - Avraham Feintuch, Bruce A. Francis:

Chains of Kinematic Points. - Claudio De Persis, Bayu Jayawardhana:

Coordination of passive systems under quantized measurements. - Ju Xiang, Ke Hu:

Limitation of multi-resolution methods in community detection. - Nicolas Bonifas, Marco Di Summa, Friedrich Eisenbrand, Nicolai Hähnle, Martin Niemeier:

On sub-determinants and the diameter of polyhedra. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID